Security is becoming a major concern in software development, both for software editors, end-users, and government agencies. A typical problem is vulnerability detection, which consists in finding in a code bugs able to let an attacker gain some unforeseen privileges like reading or writing sensible data, or even hijacking the program execution.This thesis proposes a practical approach to detect a specific kind of vulnerability, called use-after-free, occurring when a heap memory block is accessed after being freed. Such vulnerabilities have lead to numerous exploits (in particular against web browsers), and they are difficult to detect since they may involve several distant events in the code (allocating, freeingand accessing a memory blo...
Vulnerability diagnosis is important for program security analysis. It is a further step to understa...
To maintain the security of information systems, deploying the proposed updates as soon as they are ...
Background. One of the main reasons for memory corruption vulnerabilities lies in the lack of built...
Security is becoming a major concern in software development, both for software editors, end-users, ...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
International audienceThis paper presents a fully automated technique to find and trigger Use-After-...
In the beginning of the third millennium we are witnessing a new age. This new age is characterized ...
The increase in cyber-attacks around the world makes malicious code analysis a priority research are...
As software is an essential component of many embedded systems or online information systems, its ma...
In this thesis, we propose a new dynamic approach to analyze binary programs. The context of this wo...
Memory corruption is a serious class of software vulnerabilities, which requires careful attention t...
Dans ce début du troisième millénium, nous sommes témoins d'un nouvel âge. Ce nouvel âge est caracté...
International audienceThis paper presents a method for exploitable vulnerabilities detection in bina...
La menace posée par les vulnérabilités logicielles croît de manière exponentielle. Ce phénomèneest d...
Wang, HainingFor many years, use-after-free vulnerabilities have been a persistent security threat t...
Vulnerability diagnosis is important for program security analysis. It is a further step to understa...
To maintain the security of information systems, deploying the proposed updates as soon as they are ...
Background. One of the main reasons for memory corruption vulnerabilities lies in the lack of built...
Security is becoming a major concern in software development, both for software editors, end-users, ...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
International audienceThis paper presents a fully automated technique to find and trigger Use-After-...
In the beginning of the third millennium we are witnessing a new age. This new age is characterized ...
The increase in cyber-attacks around the world makes malicious code analysis a priority research are...
As software is an essential component of many embedded systems or online information systems, its ma...
In this thesis, we propose a new dynamic approach to analyze binary programs. The context of this wo...
Memory corruption is a serious class of software vulnerabilities, which requires careful attention t...
Dans ce début du troisième millénium, nous sommes témoins d'un nouvel âge. Ce nouvel âge est caracté...
International audienceThis paper presents a method for exploitable vulnerabilities detection in bina...
La menace posée par les vulnérabilités logicielles croît de manière exponentielle. Ce phénomèneest d...
Wang, HainingFor many years, use-after-free vulnerabilities have been a persistent security threat t...
Vulnerability diagnosis is important for program security analysis. It is a further step to understa...
To maintain the security of information systems, deploying the proposed updates as soon as they are ...
Background. One of the main reasons for memory corruption vulnerabilities lies in the lack of built...